Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 14:08
Behavioral task
behavioral1
Sample
eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe
Resource
win10v2004-20241007-en
General
-
Target
eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe
-
Size
431KB
-
MD5
4962575a2378d5c72e7a836ea766e2ad
-
SHA1
549964178b12017622d3cbdda6dbfdef0904e7e2
-
SHA256
eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676
-
SHA512
911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53
-
SSDEEP
12288:JOKJim5EI9tVEw/JF4+D3q2IMbgiDK7mWasB:Jj9tL8ZMEiDfWb
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 23 4484 rundll32.exe 24 4484 rundll32.exe 30 3892 rundll32.exe 31 3892 rundll32.exe 45 3396 rundll32.exe 46 3396 rundll32.exe 47 1960 rundll32.exe 48 1960 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 3 IoCs
pid Process 2608 Gxtuum.exe 1524 Gxtuum.exe 2540 Gxtuum.exe -
Loads dropped DLL 6 IoCs
pid Process 840 rundll32.exe 4484 rundll32.exe 1560 rundll32.exe 3892 rundll32.exe 3396 rundll32.exe 1960 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe -
pid Process 1412 powershell.exe 4324 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2416 netsh.exe 3672 netsh.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 4484 rundll32.exe 1412 powershell.exe 1412 powershell.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 4324 powershell.exe 4324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 4324 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5088 eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2608 5088 eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe 83 PID 5088 wrote to memory of 2608 5088 eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe 83 PID 5088 wrote to memory of 2608 5088 eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe 83 PID 2608 wrote to memory of 840 2608 Gxtuum.exe 87 PID 2608 wrote to memory of 840 2608 Gxtuum.exe 87 PID 2608 wrote to memory of 840 2608 Gxtuum.exe 87 PID 840 wrote to memory of 4484 840 rundll32.exe 88 PID 840 wrote to memory of 4484 840 rundll32.exe 88 PID 4484 wrote to memory of 2416 4484 rundll32.exe 89 PID 4484 wrote to memory of 2416 4484 rundll32.exe 89 PID 4484 wrote to memory of 1412 4484 rundll32.exe 95 PID 4484 wrote to memory of 1412 4484 rundll32.exe 95 PID 2608 wrote to memory of 1560 2608 Gxtuum.exe 103 PID 2608 wrote to memory of 1560 2608 Gxtuum.exe 103 PID 2608 wrote to memory of 1560 2608 Gxtuum.exe 103 PID 1560 wrote to memory of 3892 1560 rundll32.exe 104 PID 1560 wrote to memory of 3892 1560 rundll32.exe 104 PID 3892 wrote to memory of 3672 3892 rundll32.exe 105 PID 3892 wrote to memory of 3672 3892 rundll32.exe 105 PID 3892 wrote to memory of 4324 3892 rundll32.exe 107 PID 3892 wrote to memory of 4324 3892 rundll32.exe 107 PID 2608 wrote to memory of 3396 2608 Gxtuum.exe 112 PID 2608 wrote to memory of 3396 2608 Gxtuum.exe 112 PID 2608 wrote to memory of 3396 2608 Gxtuum.exe 112 PID 2608 wrote to memory of 1960 2608 Gxtuum.exe 114 PID 2608 wrote to memory of 1960 2608 Gxtuum.exe 114 PID 2608 wrote to memory of 1960 2608 Gxtuum.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe"C:\Users\Admin\AppData\Local\Temp\eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\437139445115_Desktop.zip' -CompressionLevel Optimal5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\437139445115_Desktop.zip' -CompressionLevel Optimal5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3396
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:2540
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
1KB
MD5fd252dc779057e73982ed35b2bd253da
SHA16c3bf7b1dedf640fc90de7bdf3b456d1ffdb1e8c
SHA256372e07ccd9023096ccdff5c060084973b7c21f41179ec95cef0514854fbf05bd
SHA512e2cdd4c229e3a543409db13bb0b40b0e00f642edb2ad50a9108662937ea190ce1212c165dfafdbd0ad2a58b83836afc8e289bd52f3381deffb66caa3b38c68f0
-
Filesize
39KB
MD57ad420c8f103efdd4b8656377b08beb1
SHA1bdf57352c516c152065ded19410d0b8caacdf457
SHA256064482a17e8b5a17f6aad3d48dddc27ec48094e08f22c113aa0d65ba1d6e36a3
SHA5123339c65e35c5b3c51d367958b0a38be63b610254c1688f54a2469fa6826aae4dcc8fef995da29cee0eb8a1ae05fac01e4ab9501c2bfc9c94e44755f76cd4041b
-
Filesize
14KB
MD5c30d2e4ac6391f51370ab3933461b2bc
SHA1859033627e1da14585f97d43dcee904e2e8c8cba
SHA25606f05b363f73d669b029ce6f129849c1fa0df57fe161b86b7e8da1b86040e937
SHA51222f078ca4cef890ba8eede25a81d3e602d86a85aca7bdda9453f9dd34e0025c24be7930300ffe37e13dfd7943d47839663757c366fd9ae237e4d958abe754d30
-
Filesize
17KB
MD519e925f2819c4452be3c56750deda4fa
SHA1948e65091ea825d896f616fc95880beb908c0cf2
SHA256ae57c387e26d88ba9d6dfe6e359ed913116f45f4c5613cf1b2f46dfba9b9acaf
SHA512e3bde690deb60f808bddd222a76d17069cf9f9774da333478e4925b1bba7ebd06c4f37ac09976ae5d89770298522ae072960ab1736cfbc7fba6c1fec42c2c7f8
-
Filesize
15KB
MD5748c9ca544fe36d548d9876eefcd1ee8
SHA1435b95fae6ae7060baffd7411332b031b4781288
SHA256dde59e35bfde917478e3c1838b43b9f0de750ac4f9d3269a5b917bd6006e5389
SHA512693f153e71b135ebfcf0e605addb0b918031c464a5cfc2261b14c1233b1cab490b3e79a4c0a5e3267c2fd962d19afdda93f70d9915ef343c4f20b40626214da0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
431KB
MD54962575a2378d5c72e7a836ea766e2ad
SHA1549964178b12017622d3cbdda6dbfdef0904e7e2
SHA256eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676
SHA512911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53
-
Filesize
124KB
MD5c2f3fbbbe6d5f48a71b6b168b1485866
SHA11cd56cfc2dc07880b65bd8a1f5b7147633f5d553
SHA256c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839
SHA512e211f18c2850987529336e0d20aa894533c1f6a8ae6745e320fd394a9481d3a956c719ac29627afd783e36e5429c0325b98e60aee2a830e75323c276c72f845a
-
Filesize
1.2MB
MD5c6aabb27450f1a9939a417e86bf53217
SHA1b8ef3bb7575139fd6997379415d7119e452b5fc4
SHA256b91a3743c7399aee454491862e015ef6fc668a25d1aa2816e065a86a03f6be35
SHA512e5fe205cb0f419e0a320488d6fa4a70e5ed58f25b570b41412ebd4f32bbe504ff75acb20bfea22513102630cf653a41e5090051f20af2ed3aadb53ce16a05944